Nuclei template designed to detect Apache servers vulnerable to CVE-2024-38473. It first identifies servers running Apache < 2.4.60 with default PHP-FPM settings.
Then, it fuzzes for potential PHP files protected by ACLs that might be bypassed due to this vulnerability.
Install
- To use this Nuclei template, you need to clone the repository. You can do this by running the following command:
git clone https://github.com/juanschallibaum/CVE-2024-38473-Nuclei-Template
2. Navigate to the cloned repository directory:
cd CVE-2024-38473-Nuclei-Template
Usage
- Run nuclei template in single host:
nuclei -t CVE-2024-38473.yaml -u http://example.com
- Run nuclei template against a list of hosts:
nuclei -t CVE-2024-38473.yaml -l hosts.txt
- Run nuclei template in single host specifying a valid .html or .php file:
nuclei -t CVE-2024-38473.yaml -u http://example.com/valid.php
Testing Environment
To easily test the CVE-2024-38473 vulnerability, you can set up a vulnerable environment using Docker. Follow these steps to quickly verify the effectiveness of the Nuclei template:
- Ensure Docker Daemon is Running: Make sure the Docker daemon is running on your system. You can start it with the following command if it’s not already running:
sudo systemctl start docker
For more information click here.